Documentation
¶
Overview ¶
Package secrets provides an interface for a simple secret store: you ask it for a secret (a byte blob, identifies by some key), and it returns it to you (current version, as well as a bunch of previous versions). Caller are supposed to use the secret for an operation and then forget it (e.g. do not try to store it elsewhere).
Secure storage, retrieval and rotation of secrets is outside of the scope of this interface: it's the responsibility of the implementation.
Index ¶
- Variables
- func NewModule(opts *ModuleOptions) module.Module
- func NewModuleFromFlags() module.Module
- func Set(c context.Context, s Store) context.Context
- func SetFactory(c context.Context, f Factory) context.Context
- type DerivedStore
- type Factory
- type FileSource
- type ModuleOptions
- type Secret
- type SecretManagerSource
- type Source
- type StaticSource
- type StaticStore
- type Store
Constants ¶
This section is empty.
Variables ¶
var ( // ErrNoStoreConfigured is returned by GetSecret if secret store is not in // the context. ErrNoStoreConfigured = errors.New("secrets.Store is not in the context") )
var ( // ErrNoSuchSecret is returned by Store.GetSecret if it can't find a secret. ErrNoSuchSecret = errors.New("secret not found") )
Functions ¶
func NewModule ¶
func NewModule(opts *ModuleOptions) module.Module
NewModule returns a server module that adds a secret store to the global server context.
Uses a DerivedStore with the root secret populated based on the supplied options. When the server starts, the module reads the initial root secret (if provided) and launches a job to periodically reread it.
An error to read the secret during the startup is fatal. But if the server managed to start successfully and can't re-read the secret later (e.g. the file disappeared), it logs the error and keeps using the cached secret.
func NewModuleFromFlags ¶
NewModuleFromFlags is a variant of NewModule that initializes options through command line flags.
Calling this function registers flags in flag.CommandLine. They are usually parsed in server.Main(...).
Types ¶
type DerivedStore ¶
type DerivedStore struct {
// contains filtered or unexported fields
}
DerivedStore implements Store by deriving secrets from some single master secret using HKDF.
Caches all derived secrets internally forever. Assumes the set of possible key names is limited.
func NewDerivedStore ¶
func NewDerivedStore(root Secret) *DerivedStore
NewDerivedStore returns a store that derives secrets from the given root key.
func (*DerivedStore) GetSecret ¶
func (d *DerivedStore) GetSecret(name string) (Secret, error)
GetSecret returns a generated secret given its key.
func (*DerivedStore) SetRoot ¶
func (d *DerivedStore) SetRoot(root Secret)
SetRoot replaces the root key used to derive secrets.
type FileSource ¶
type FileSource struct {
Path string
}
FileSource reads the secret from a JSON file on disk.
func (*FileSource) ReadSecret ¶
func (s *FileSource) ReadSecret(context.Context) (*Secret, error)
ReadSecret is part of Source interface.
type ModuleOptions ¶
type ModuleOptions struct { // RootSecret points to the root secret key used to derive all other secrets. // // It can be either a local file system path, a reference to a Google Secret // Manager secret (in a form "sm://<project>/<secret>"), or a literal secret // value (in a form "devsecret://<base64-encoded secret>"). The latter is // supposed to be used **only** during development (e.g. locally or in // development deployments). // // When it is a local file system path, it should point to a JSON file with // the following structure (see Secret struct): // // { // "current": <base64-encoded blob>, // "previous": [<base64-encoded blob>, <base64-encoded blob>, ...] // } // // When using Google Secret Manager, the secret version "latest" is used to // get the current value of the secret, and a single immediately preceding // previous version (if it is still enabled) is used to get the previous // version of the secret. This allows graceful rotation of secrets. RootSecret string // Source produces the root secret to use by the module. // // If given, overrides RootSecret. This is useful when the secrets module // is initialized programmatically rather than through flags. // // The module will periodically use Source's ReadSecret to refresh the root // secret it stores in memory. This allows the secret to be rotated without // restarting all servers that use it. Source Source }
ModuleOptions contain configuration of the secrets server module.
func (*ModuleOptions) Register ¶
func (o *ModuleOptions) Register(f *flag.FlagSet)
Register registers the command line flags.
type Secret ¶
type Secret struct { Current []byte `json:"current"` // current value of the secret, always set Previous [][]byte `json:"previous,omitempty"` // optional list of previous values, most recent first }
Secret represents a current value of a secret as well as a set of few previous values. Previous values are important when key is being rotated: there may be valid outstanding derivatives of previous values of the secret.
func GetSecret ¶
GetSecret is a shortcut for grabbing a Store from the context and using its GetSecret method.
If the context doesn't have Store set, returns ErrNoStoreConfigured.
type SecretManagerSource ¶
type SecretManagerSource struct {
// contains filtered or unexported fields
}
SecretManagerSource is a Source that uses Google Secret Manager.
Construct it with NewSecretManagerSource.
func NewSecretManagerSource ¶
func NewSecretManagerSource(ctx context.Context, secretURL string, ts oauth2.TokenSource) (*SecretManagerSource, error)
NewSecretManagerSource parses "sm://<project>/<name>" and sets up the source that fetches the latest two versions of this GSM secret as a single *Secret.
Uses the given TokenSource for authentication.
func (*SecretManagerSource) Close ¶
func (s *SecretManagerSource) Close() error
Close is part of Source interface.
func (*SecretManagerSource) ReadSecret ¶
func (s *SecretManagerSource) ReadSecret(ctx context.Context) (*Secret, error)
ReadSecret is part of Source interface.
type Source ¶
type Source interface { // ReadSecret returns the most recent value of the secret in the source. ReadSecret(context.Context) (*Secret, error) // Close releases any allocated resources. Close() error }
Source knows how to fetch (and refetch) a secret from some fixed location.
type StaticSource ¶
type StaticSource struct {
Secret *Secret
}
StaticSource is a Source that returns the same static secret all the time.
func (*StaticSource) Close ¶
func (s *StaticSource) Close() error
Close is part of Source interface.
func (*StaticSource) ReadSecret ¶
func (s *StaticSource) ReadSecret(context.Context) (*Secret, error)
ReadSecret is part of Source interface.
type StaticStore ¶
StaticStore is Store with predefined secrets.
type Store ¶
type Store interface { // GetSecret returns a secret given its key. // // Store may choose to autogenerate a secret if there's no existing one, or it // may choose to treat it as a error and return ErrNoSuchSecret. GetSecret(name string) (Secret, error) }
Store knows how to retrieve (or autogenerate) a secret given its key.
Source Files
¶
Directories
¶
Path | Synopsis |
---|---|
Package testsecrets provides a dumb in-memory secret store to use in unit tests.
|
Package testsecrets provides a dumb in-memory secret store to use in unit tests. |